-
-
Save Sharpie/7b5d4e858b80aba7a51d to your computer and use it in GitHub Desktop.
Yum/Yumrepo interaction logs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Agent is running Scientific Linux Fermi 6.3 | |
[root@scilinux ~]# yum -y remove puppetlabs-release; yum clean all; rm -f /etc/yum.repos.d/puppet*; ls /etc/yum.repos.d/puppet* | |
Loaded plugins: security | |
Setting up Remove Process | |
Resolving Dependencies | |
--> Running transaction check | |
---> Package puppetlabs-release.noarch 0:6-7 will be erased | |
--> Finished Dependency Resolution | |
epel | 4.2 kB 00:00 | |
epel/primary_db | 5.0 MB 01:06 | |
slf | 3.2 kB 00:00 | |
slf/primary_db | 4.1 MB 00:01 | |
slf-security | 2.3 kB 00:00 | |
slf-security/primary_db | 6.2 MB 00:02 | |
Dependencies Resolved | |
========================================================================================================================================================================== | |
Package Arch Version Repository Size | |
========================================================================================================================================================================== | |
Removing: | |
puppetlabs-release noarch 6-7 installed 2.9 k | |
Transaction Summary | |
========================================================================================================================================================================== | |
Remove 1 Package(s) | |
Installed size: 2.9 k | |
Downloading Packages: | |
Running rpm_check_debug | |
Running Transaction Test | |
Transaction Test Succeeded | |
Running Transaction | |
Warning: RPMDB altered outside of yum. | |
Erasing : puppetlabs-release-6-7.noarch 1/1 | |
warning: /etc/yum.repos.d/puppetlabs.repo saved as /etc/yum.repos.d/puppetlabs.repo.rpmsave | |
Verifying : puppetlabs-release-6-7.noarch 1/1 | |
Removed: | |
puppetlabs-release.noarch 0:6-7 | |
Complete! | |
Loaded plugins: security | |
Cleaning repos: epel slf slf-security | |
Cleaning up Everything | |
ls: cannot access /etc/yum.repos.d/puppet*: No such file or directory | |
[root@scilinux ~]# puppet agent -t --debug --trace | |
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/clientbucket"}' | |
Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist | |
Debug: Puppet::Type::User::ProviderPw: file pw does not exist | |
Debug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not exist | |
Debug: Puppet::Type::User::ProviderLdap: true value when expecting false | |
Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs/ca.pem"}' | |
Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/crl.pem"}' | |
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/state/last_run_summary.yaml"}' | |
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs"}' | |
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet/state/graphs"}' | |
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet"}' | |
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certificate_requests"}' | |
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"755", :loglevel=>:debug, :path=>"/var/run/puppet"}' | |
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/client_yaml"}' | |
Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/scilinux.boxnet.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"600", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private_keys/scilinux.boxnet.pem"}' | |
Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"root", :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/state/resources.txt"}' | |
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/state/last_run_report.yaml"}' | |
Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist | |
Debug: Puppet::Type::Group::ProviderPw: file pw does not exist | |
Debug: Puppet::Type::Group::ProviderLdap: true value when expecting false | |
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:links=>:follow, :ensure=>:directory, :group=>"puppet", :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/log/puppet"}' | |
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"771", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl"}' | |
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private_keys"}' | |
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet/lib"}' | |
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/client_data"}' | |
Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/scilinux.boxnet.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/public_keys/scilinux.boxnet.pem"}' | |
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"1755", :loglevel=>:debug, :path=>"/var/lib/puppet/state"}' | |
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/etc/puppet"}' | |
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/public_keys"}' | |
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private"}' | |
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"660", :loglevel=>:debug, :path=>"/var/lib/puppet/state/state.yaml"}' | |
Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/scilinux.boxnet.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs/scilinux.boxnet.pem"}' | |
Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/classes.txt]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"root", :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/classes.txt"}' | |
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/private_keys/scilinux.boxnet.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys] | |
Debug: /File[/var/lib/puppet/client_data]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/client_yaml]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/state/graphs]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/clientbucket]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/state/resources.txt]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/certs/scilinux.boxnet.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] | |
Debug: /File[/var/lib/puppet/classes.txt]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/public_keys/scilinux.boxnet.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys] | |
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] | |
Debug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring File[/var/lib/puppet/state] | |
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring File[/var/lib/puppet/state] | |
Debug: Finishing transaction 70065302757120 | |
Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs/ca.pem"}' | |
Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/crl.pem"}' | |
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs"}' | |
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet"}' | |
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certificate_requests"}' | |
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"755", :loglevel=>:debug, :path=>"/var/run/puppet"}' | |
Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/scilinux.boxnet.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"600", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private_keys/scilinux.boxnet.pem"}' | |
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:links=>:follow, :ensure=>:directory, :group=>"puppet", :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/log/puppet"}' | |
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"771", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl"}' | |
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private_keys"}' | |
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet/lib"}' | |
Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/scilinux.boxnet.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/public_keys/scilinux.boxnet.pem"}' | |
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"1755", :loglevel=>:debug, :path=>"/var/lib/puppet/state"}' | |
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/etc/puppet"}' | |
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/public_keys"}' | |
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private"}' | |
Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/scilinux.boxnet.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs/scilinux.boxnet.pem"}' | |
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/certs/scilinux.boxnet.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] | |
Debug: /File[/var/lib/puppet/ssl/public_keys/scilinux.boxnet.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys] | |
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] | |
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet] | |
Debug: /File[/var/lib/puppet/ssl/private_keys/scilinux.boxnet.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys] | |
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl] | |
Debug: Finishing transaction 70065301792040 | |
Debug: Using cached certificate for ca | |
Debug: Using cached certificate for scilinux.boxnet | |
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/clientbucket"}' | |
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/state/last_run_summary.yaml"}' | |
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet/state/graphs"}' | |
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/client_yaml"}' | |
Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"root", :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/state/resources.txt"}' | |
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/state/last_run_report.yaml"}' | |
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/client_data"}' | |
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"660", :loglevel=>:debug, :path=>"/var/lib/puppet/state/state.yaml"}' | |
Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/classes.txt]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"root", :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/classes.txt"}' | |
Debug: Finishing transaction 70065301412320 | |
Debug: Loaded state in 0.00 seconds | |
Debug: node supports formats: b64_zlib_yaml pson raw yaml; using pson | |
Debug: Using cached certificate for ca | |
Debug: Using cached certificate for scilinux.boxnet | |
Debug: Using cached certificate_revocation_list for ca | |
Info: Retrieving plugin | |
Debug: file_metadata supports formats: b64_zlib_yaml pson raw yaml; using pson | |
Debug: Finishing transaction 70065301198300 | |
Debug: catalog supports formats: b64_zlib_yaml dot pson raw yaml; using pson | |
Debug: Executing '/bin/rpm --version' | |
Debug: Executing '/bin/rpm --version' | |
Debug: Executing '/bin/rpm -ql rpm' | |
Debug: Executing '/bin/rpm -ql rpm' | |
Info: Caching catalog for scilinux.boxnet | |
Debug: Puppet::Type::Package::ProviderPkg: file /usr/bin/pkg does not exist | |
Debug: Puppet::Type::Package::ProviderUrpmi: file urpmi does not exist | |
Debug: Puppet::Type::Package::ProviderPacman: file /usr/bin/pacman does not exist | |
Debug: Puppet::Type::Package::ProviderPorts: file /usr/local/sbin/portupgrade does not exist | |
Debug: Puppet::Type::Package::ProviderOpenbsd: file pkg_info does not exist | |
Debug: Puppet::Type::Package::ProviderAptrpm: file apt-get does not exist | |
Debug: Puppet::Type::Package::ProviderPortupgrade: file /usr/local/sbin/portupgrade does not exist | |
Debug: Puppet::Type::Package::ProviderFreebsd: file /usr/sbin/pkg_info does not exist | |
Debug: Puppet::Type::Package::ProviderZypper: file /usr/bin/zypper does not exist | |
Debug: Puppet::Type::Package::ProviderHpux: file /usr/sbin/swinstall does not exist | |
Debug: Puppet::Type::Package::ProviderSunfreeware: file pkg-get does not exist | |
Debug: Puppet::Type::Package::ProviderSun: file /usr/bin/pkginfo does not exist | |
Debug: Puppet::Type::Package::ProviderNim: file /usr/sbin/nimclient does not exist | |
Debug: Puppet::Type::Package::ProviderUp2date: file /usr/sbin/up2date-nox does not exist | |
Debug: Puppet::Type::Package::ProviderAix: file /usr/bin/lslpp does not exist | |
Debug: Puppet::Type::Package::ProviderAptitude: file /usr/bin/aptitude does not exist | |
Debug: Puppet::Type::Package::ProviderFink: file /sw/bin/fink does not exist | |
Debug: Puppet::Type::Package::ProviderPkgin: file pkgin does not exist | |
Debug: Puppet::Type::Package::ProviderRug: file /usr/bin/rug does not exist | |
Debug: Puppet::Type::Package::ProviderApt: file /usr/bin/apt-get does not exist | |
Debug: Puppet::Type::Package::ProviderPortage: file /usr/bin/emerge does not exist | |
Debug: Puppet::Type::Package::ProviderDpkg: file /usr/bin/dpkg does not exist | |
Debug: Creating default schedules | |
Debug: Loaded state in 0.00 seconds | |
Info: Applying configuration version '1366756139' | |
Debug: /Stage[main]//Node[scilinux.boxnet]/Yumrepo[puppetlabs-products]/require: requires Package[puppetlabs-release] | |
Debug: /Stage[main]//Node[scilinux.boxnet]/Yumrepo[puppetlabs-deps]/require: requires Package[puppetlabs-release] | |
Debug: /Schedule[daily]: Skipping device resources because running on a host | |
Debug: /Schedule[monthly]: Skipping device resources because running on a host | |
Debug: /Schedule[hourly]: Skipping device resources because running on a host | |
Debug: Prefetching rpm resources for package | |
Debug: Executing '/bin/rpm --version' | |
Debug: Executing '/bin/rpm -qa --nosignature --nodigest --qf '%{NAME} %|EPOCH?{%{EPOCH}}:{0}| %{VERSION} %{RELEASE} %{ARCH} | |
'' | |
Debug: Executing '/bin/rpm -q puppetlabs-release --nosignature --nodigest --qf %{NAME} %|EPOCH?{%{EPOCH}}:{0}| %{VERSION} %{RELEASE} %{ARCH} | |
' | |
Debug: Executing '/bin/rpm -i --oldpackage http://yum.puppetlabs.com/el/6/products/x86_64/puppetlabs-release-6-7.noarch.rpm' | |
Notice: /Stage[main]//Node[scilinux.boxnet]/Package[puppetlabs-release]/ensure: created | |
Debug: /Stage[main]//Node[scilinux.boxnet]/Package[puppetlabs-release]: The container Node[scilinux.boxnet] will propagate my refresh event | |
Notice: /Stage[main]//Node[scilinux.boxnet]/Yumrepo[puppetlabs-deps]/enabled: enabled changed '1' to '0' | |
Debug: /Stage[main]//Node[scilinux.boxnet]/Yumrepo[puppetlabs-deps]: The container Node[scilinux.boxnet] will propagate my refresh event | |
Notice: /Stage[main]//Node[scilinux.boxnet]/Yumrepo[puppetlabs-products]/enabled: enabled changed '1' to '0' | |
Debug: /Stage[main]//Node[scilinux.boxnet]/Yumrepo[puppetlabs-products]: The container Node[scilinux.boxnet] will propagate my refresh event | |
Debug: Node[scilinux.boxnet]: The container Class[Main] will propagate my refresh event | |
Debug: /Schedule[never]: Skipping device resources because running on a host | |
Debug: /Schedule[weekly]: Skipping device resources because running on a host | |
Debug: /Schedule[puppet]: Skipping device resources because running on a host | |
Debug: Class[Main]: The container Stage[main] will propagate my refresh event | |
Debug: Finishing transaction 70065288571340 | |
Debug: Storing state | |
Debug: Stored state in 0.00 seconds | |
Notice: Finished catalog run in 5.50 seconds | |
Debug: Value of 'preferred_serialization_format' (pson) is invalid for report, using default (b64_zlib_yaml) | |
Debug: report supports formats: b64_zlib_yaml raw yaml; using b64_zlib_yaml | |
[root@scilinux ~]# ls /etc/yum.repos.d/ | |
epel.repo fermi-addons.repo puppetlabs.repo slf-other.repo slf.repo | |
[root@scilinux ~]# cat /etc/yum.repos.d/puppetlabs.repo | |
[puppetlabs-products] | |
name=Puppet Labs Products El 6 - $basearch | |
baseurl=http://yum.puppetlabs.com/el/6/products/$basearch | |
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppetlabs | |
enabled=0 | |
gpgcheck=1 | |
[puppetlabs-deps] | |
name=Puppet Labs Dependencies El 6 - $basearch | |
baseurl=http://yum.puppetlabs.com/el/6/dependencies/$basearch | |
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppetlabs | |
enabled=0 | |
gpgcheck=1 | |
[puppetlabs-devel] | |
name=Puppet Labs Devel El 6 - $basearch | |
baseurl=http://yum.puppetlabs.com/el/6/devel/$basearch | |
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppetlabs | |
enabled=0 | |
gpgcheck=1 | |
[puppetlabs-products-source] | |
name=Puppet Labs Products El 6 - $basearch - Source | |
baseurl=http://yum.puppetlabs.com/el/6/products/SRPMS | |
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppetlabs | |
failovermethod=priority | |
enabled=0 | |
gpgcheck=1 | |
[puppetlabs-deps-source] | |
name=Puppet Labs Source Dependencies El 6 - $basearch - Source | |
baseurl=http://yum.puppetlabs.com/el/6/dependencies/SRPMS | |
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppetlabs | |
enabled=0 | |
gpgcheck=1 | |
[puppetlabs-devel-source] | |
name=Puppet Labs Devel El 6 - $basearch - Source | |
baseurl=http://yum.puppetlabs.com/el/6/devel/SRPMS | |
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppetlabs | |
enabled=0 | |
gpgcheck=1 | |
[root@scilinux ~]# rpm -qa | grep ruby | |
ruby-libs-1.8.7.352-10.el6_4.x86_64 | |
rubygems-1.3.7-1.el6.noarch | |
ruby-augeas-0.4.1-1.el6.x86_64 | |
ruby-1.8.7.352-10.el6_4.x86_64 | |
ruby-rdoc-1.8.7.352-10.el6_4.x86_64 | |
ruby-devel-1.8.7.352-10.el6_4.x86_64 | |
ruby-shadow-1.4.1-13.el6.x86_64 | |
libselinux-ruby-2.0.94-5.3.el6.x86_64 | |
ruby-irb-1.8.7.352-10.el6_4.x86_64 | |
rubygem-json-1.5.5-1.el6.x86_64 | |
[root@scilinux ~]# facter | grep oper | |
operatingsystem => Scientific | |
operatingsystemmajrelease => 6 | |
operatingsystemrelease => 6.3 | |
[root@scilinux ~]# facter | grep lsb | |
lsbdistcodename => Ramsey | |
lsbdistdescription => Scientific Linux Fermi release 6.3 (Ramsey) | |
lsbdistid => ScientificFermi | |
lsbdistrelease => 6.3 | |
lsbmajdistrelease => 6 | |
lsbrelease => :core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch | |
[root@scilinux ~]# cat /etc/puppet/puppet.conf | |
[main] | |
# The Puppet log directory. | |
# The default value is '$vardir/log'. | |
logdir = /var/log/puppet | |
# Where Puppet PID files are kept. | |
# The default value is '$vardir/run'. | |
rundir = /var/run/puppet | |
# Where SSL certificates are kept. | |
# The default value is '$confdir/ssl'. | |
ssldir = $vardir/ssl | |
[agent] | |
# The file in which puppetd stores a list of the classes | |
# associated with the retrieved configuratiion. Can be loaded in | |
# the separate ``puppet`` executable using the ``--loadclasses`` | |
# option. | |
# The default value is '$confdir/classes.txt'. | |
classfile = $vardir/classes.txt | |
# Where puppetd caches the local configuration. An | |
# extension indicating the cache format is added automatically. | |
# The default value is '$confdir/localconfig'. | |
localconfig = $vardir/localconfig | |
server=puppetmaster.boxnet |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# master is running CentOS 6.3 | |
[root@puppetmaster puppet]# cat /etc/puppet/manifests/site.pp | |
node 'scilinux.boxnet' { | |
package { 'puppetlabs-release': | |
ensure => 'present', | |
provider => 'rpm', | |
source => "http://yum.puppetlabs.com/el/${lsbmajdistrelease}/products/x86_64/puppetlabs-release-${lsbmajdistrelease}-7.noarch.rpm", | |
} | |
yumrepo { | |
'puppetlabs-products': | |
enabled => "0", | |
require => Package['puppetlabs-release'],; | |
'puppetlabs-deps': | |
enabled => "0", | |
require => Package['puppetlabs-release'],; | |
} | |
} | |
[root@puppetmaster puppet]# cat /etc/puppet/puppet.conf | |
[main] | |
# The Puppet log directory. | |
# The default value is '$vardir/log'. | |
logdir = /var/log/puppet | |
# Where Puppet PID files are kept. | |
# The default value is '$vardir/run'. | |
rundir = /var/run/puppet | |
# Where SSL certificates are kept. | |
# The default value is '$confdir/ssl'. | |
ssldir = $vardir/ssl | |
[agent] | |
# The file in which puppetd stores a list of the classes | |
# associated with the retrieved configuratiion. Can be loaded in | |
# the separate ``puppet`` executable using the ``--loadclasses`` | |
# option. | |
# The default value is '$confdir/classes.txt'. | |
classfile = $vardir/classes.txt | |
# Where puppetd caches the local configuration. An | |
# extension indicating the cache format is added automatically. | |
# The default value is '$confdir/localconfig'. | |
localconfig = $vardir/localconfig |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment